diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 4535fc717a..4b43bc5767 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -181,8 +181,8 @@ "description": "Test code for poodle attack (CVE-2014-3566)", "fork": false, "created_at": "2024-11-14T04:35:59Z", - "updated_at": "2025-01-01T15:43:07Z", - "pushed_at": "2025-01-01T15:42:06Z", + "updated_at": "2025-01-05T15:26:10Z", + "pushed_at": "2025-01-05T17:52:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 4308498539..a9a3654fbb 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2025-01-02T03:01:47Z", + "updated_at": "2025-01-05T16:26:29Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 217, - "watchers_count": 217, + "stargazers_count": 218, + "watchers_count": 218, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 217, + "watchers": 218, "score": 0, "subscribers_count": 10 } diff --git a/2019/CVE-2019-1619.json b/2019/CVE-2019-1619.json index 089d2f17d3..5d0843f0e5 100644 --- a/2019/CVE-2019-1619.json +++ b/2019/CVE-2019-1619.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index f8d508aa1b..bbb839cff3 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -14,10 +14,10 @@ "description": "Root your MediaTek device with CVE-2020-0069", "fork": false, "created_at": "2019-09-06T12:12:48Z", - "updated_at": "2024-12-20T01:17:39Z", + "updated_at": "2025-01-05T16:29:27Z", "pushed_at": "2023-02-06T19:18:56Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 154, + "watchers_count": 154, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 153, + "watchers": 154, "score": 0, "subscribers_count": 11 }, diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json index 67a31a9448..3c3522b6f7 100644 --- a/2020/CVE-2020-25223.json +++ b/2020/CVE-2020-25223.json @@ -76,7 +76,7 @@ "description": "poc-cve-2020-25223", "fork": false, "created_at": "2025-01-05T03:34:33Z", - "updated_at": "2025-01-05T03:40:15Z", + "updated_at": "2025-01-05T17:28:34Z", "pushed_at": "2025-01-05T03:40:12Z", "stargazers_count": 0, "watchers_count": 0, @@ -85,7 +85,12 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "cve-2020-25223", + "poc", + "poc-cve-2020-25223", + "rce" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2021/CVE-2021-3929.json b/2021/CVE-2021-3929.json index b6c01d005a..301a809e8b 100644 --- a/2021/CVE-2021-3929.json +++ b/2021/CVE-2021-3929.json @@ -14,10 +14,10 @@ "description": "Recursive MMIO VM Escape PoC", "fork": false, "created_at": "2022-05-13T05:33:28Z", - "updated_at": "2024-12-20T00:07:19Z", + "updated_at": "2025-01-05T18:08:29Z", "pushed_at": "2022-05-13T05:37:41Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 170, + "watchers": 171, "score": 0, "subscribers_count": 7 } diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 12ca694376..049dc801bc 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2025-01-04T01:28:08Z", + "updated_at": "2025-01-05T14:16:19Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1605, - "watchers_count": 1605, + "stargazers_count": 1606, + "watchers_count": 1606, "has_discussions": false, "forks_count": 483, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 483, - "watchers": 1605, + "watchers": 1606, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index f834e3f6e7..60f55b9f7a 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -14,10 +14,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2025-01-04T15:32:04Z", + "updated_at": "2025-01-05T16:37:14Z", "pushed_at": "2024-10-31T18:50:48Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 77, + "watchers": 78, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-41091.json b/2021/CVE-2021-41091.json index fb6eceb137..1bb23267b3 100644 --- a/2021/CVE-2021-41091.json +++ b/2021/CVE-2021-41091.json @@ -14,10 +14,10 @@ "description": "POC for CVE-2021-41091", "fork": false, "created_at": "2023-05-02T07:25:13Z", - "updated_at": "2024-09-12T10:27:44Z", + "updated_at": "2025-01-05T16:21:20Z", "pushed_at": "2023-05-20T09:16:34Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 65, + "watchers": 64, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-44967.json b/2021/CVE-2021-44967.json new file mode 100644 index 0000000000..4060043595 --- /dev/null +++ b/2021/CVE-2021-44967.json @@ -0,0 +1,33 @@ +[ + { + "id": 912395761, + "name": "LimeSurvey-RCE", + "full_name": "D3Ext\/LimeSurvey-RCE", + "owner": { + "login": "D3Ext", + "id": 67125397, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4", + "html_url": "https:\/\/github.com\/D3Ext", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/D3Ext\/LimeSurvey-RCE", + "description": "POC exploit for CVE-2021-44967", + "fork": false, + "created_at": "2025-01-05T13:12:07Z", + "updated_at": "2025-01-05T13:13:21Z", + "pushed_at": "2025-01-05T13:13:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45745.json b/2021/CVE-2021-45745.json index 41c08a682e..abeae80212 100644 --- a/2021/CVE-2021-45745.json +++ b/2021/CVE-2021-45745.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 448040948, - "name": "CVE-2021-45745", - "full_name": "plsanu\/CVE-2021-45745", - "owner": { - "login": "plsanu", - "id": 61007700, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4", - "html_url": "https:\/\/github.com\/plsanu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45745", - "description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.", - "fork": false, - "created_at": "2022-01-14T16:52:08Z", - "updated_at": "2023-12-30T08:24:27Z", - "pushed_at": "2022-01-14T16:52:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23305.json b/2022/CVE-2022-23305.json index 368815f85d..fe92d33ad7 100644 --- a/2022/CVE-2022-23305.json +++ b/2022/CVE-2022-23305.json @@ -64,7 +64,7 @@ "description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ", "fork": false, "created_at": "2022-01-21T05:07:59Z", - "updated_at": "2022-11-05T22:58:02Z", + "updated_at": "2025-01-05T13:55:52Z", "pushed_at": "2022-01-21T05:21:25Z", "stargazers_count": 5, "watchers_count": 5, diff --git a/2022/CVE-2022-25375.json b/2022/CVE-2022-25375.json index 83a48b5788..e1a03ed116 100644 --- a/2022/CVE-2022-25375.json +++ b/2022/CVE-2022-25375.json @@ -14,10 +14,10 @@ "description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget", "fork": false, "created_at": "2022-02-17T14:02:58Z", - "updated_at": "2025-01-05T05:53:23Z", + "updated_at": "2025-01-05T14:13:23Z", "pushed_at": "2022-02-20T19:56:48Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 2 } diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index ab2486b3a0..2be394995b 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -336,10 +336,10 @@ "description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.", "fork": false, "created_at": "2023-02-12T01:33:45Z", - "updated_at": "2025-01-05T04:38:44Z", + "updated_at": "2025-01-05T16:49:42Z", "pushed_at": "2023-02-12T01:33:48Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -348,7 +348,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 18, + "watchers": 17, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index cf549f5627..03d150eb36 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -45,10 +45,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-24T13:54:42Z", - "updated_at": "2025-01-05T05:24:23Z", + "updated_at": "2025-01-05T12:47:00Z", "pushed_at": "2023-02-24T13:29:38Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 108, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 108, - "watchers": 64, + "watchers": 65, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json index a48781cf72..d400bd1bd6 100644 --- a/2023/CVE-2023-22809.json +++ b/2023/CVE-2023-22809.json @@ -209,10 +209,10 @@ "description": null, "fork": false, "created_at": "2023-07-10T06:38:14Z", - "updated_at": "2024-10-26T17:02:01Z", + "updated_at": "2025-01-05T17:10:39Z", "pushed_at": "2023-07-13T06:20:19Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -221,7 +221,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-28434.json b/2023/CVE-2023-28434.json index 7c498bb22c..75b9fd4a84 100644 --- a/2023/CVE-2023-28434.json +++ b/2023/CVE-2023-28434.json @@ -14,10 +14,10 @@ "description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE", "fork": false, "created_at": "2023-03-27T08:53:04Z", - "updated_at": "2024-11-21T06:22:45Z", + "updated_at": "2025-01-05T17:25:07Z", "pushed_at": "2023-04-04T05:26:59Z", - "stargazers_count": 307, - "watchers_count": 307, + "stargazers_count": 308, + "watchers_count": 308, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 307, + "watchers": 308, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index e819006ef9..2e8959d67a 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,19 +14,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-05T11:09:21Z", + "updated_at": "2025-01-05T17:27:45Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1357, - "watchers_count": 1357, + "stargazers_count": 1358, + "watchers_count": 1358, "has_discussions": false, - "forks_count": 228, + "forks_count": 229, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 228, - "watchers": 1357, + "forks": 229, + "watchers": 1358, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json index 6a7f5e3686..c40751b124 100644 --- a/2023/CVE-2023-6319.json +++ b/2023/CVE-2023-6319.json @@ -14,10 +14,10 @@ "description": "CVE-2023-6319 proof of concept", "fork": false, "created_at": "2024-04-11T18:58:17Z", - "updated_at": "2025-01-03T09:17:30Z", + "updated_at": "2025-01-05T15:56:13Z", "pushed_at": "2024-10-17T11:18:46Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 39, + "watchers": 40, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index d142ed48ea..ece549be7f 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2025-01-03T15:13:52Z", + "updated_at": "2025-01-05T13:37:59Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2318, - "watchers_count": 2318, + "stargazers_count": 2319, + "watchers_count": 2319, "has_discussions": false, "forks_count": 300, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 2318, + "watchers": 2319, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-2667.json b/2024/CVE-2024-2667.json index dbbc28bf3b..1d9ce1b8f4 100644 --- a/2024/CVE-2024-2667.json +++ b/2024/CVE-2024-2667.json @@ -29,5 +29,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 912431927, + "name": "CVE-2024-2667-Poc", + "full_name": "Nxploited\/CVE-2024-2667-Poc", + "owner": { + "login": "Nxploited", + "id": 188819918, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4", + "html_url": "https:\/\/github.com\/Nxploited", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-2667-Poc", + "description": null, + "fork": false, + "created_at": "2025-01-05T15:03:50Z", + "updated_at": "2025-01-05T16:21:03Z", + "pushed_at": "2025-01-05T16:21:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 21cf8665de..a7405df5e0 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2025-01-05T01:29:42Z", + "updated_at": "2025-01-05T12:50:13Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 245, - "watchers_count": 245, + "stargazers_count": 246, + "watchers_count": 246, "has_discussions": false, "forks_count": 54, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 54, - "watchers": 245, + "watchers": 246, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index cb0ed8c6e3..dad9b42326 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -200,19 +200,19 @@ "description": "Zabbix CVE-2024-42327 PoC", "fork": false, "created_at": "2025-01-01T18:25:44Z", - "updated_at": "2025-01-05T07:51:36Z", + "updated_at": "2025-01-05T14:59:02Z", "pushed_at": "2025-01-03T13:49:03Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 5, + "forks": 3, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 6f7d2d9b08..a3e40e0176 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -324,5 +324,40 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 912425407, + "name": "WEAPONIZING-CVE-2024-4367", + "full_name": "exfil0\/WEAPONIZING-CVE-2024-4367", + "owner": { + "login": "exfil0", + "id": 84948741, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4", + "html_url": "https:\/\/github.com\/exfil0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/exfil0\/WEAPONIZING-CVE-2024-4367", + "description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.", + "fork": false, + "created_at": "2025-01-05T14:44:01Z", + "updated_at": "2025-01-05T15:09:38Z", + "pushed_at": "2025-01-05T15:09:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2024-4367", + "spyware", + "weaponized" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-45200.json b/2024/CVE-2024-45200.json index 05f4fb9ca9..148bc781af 100644 --- a/2024/CVE-2024-45200.json +++ b/2024/CVE-2024-45200.json @@ -14,10 +14,10 @@ "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", "fork": false, "created_at": "2024-09-13T00:41:32Z", - "updated_at": "2024-12-20T01:07:07Z", + "updated_at": "2025-01-05T15:43:39Z", "pushed_at": "2024-10-01T00:57:03Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 3024c0980b..e19e23a257 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,19 +14,19 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-05T09:22:19Z", + "updated_at": "2025-01-05T14:27:28Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 340, - "watchers_count": 340, + "stargazers_count": 344, + "watchers_count": 344, "has_discussions": false, - "forks_count": 78, + "forks_count": 79, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 78, - "watchers": 340, + "forks": 79, + "watchers": 344, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-51567.json b/2024/CVE-2024-51567.json index e57221440a..32bf9b985f 100644 --- a/2024/CVE-2024-51567.json +++ b/2024/CVE-2024-51567.json @@ -14,10 +14,10 @@ "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.", "fork": false, "created_at": "2024-10-31T21:55:57Z", - "updated_at": "2024-12-11T09:00:00Z", + "updated_at": "2025-01-05T16:12:36Z", "pushed_at": "2024-11-01T10:48:42Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 9372dbcf4d..1708461dd8 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -653,10 +653,10 @@ "description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.", "fork": false, "created_at": "2024-07-02T06:53:35Z", - "updated_at": "2024-12-17T12:52:05Z", + "updated_at": "2025-01-05T15:46:06Z", "pushed_at": "2024-07-04T20:04:30Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -665,7 +665,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 1 }, @@ -1159,10 +1159,10 @@ "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-02T14:41:43Z", - "updated_at": "2024-12-26T06:26:46Z", + "updated_at": "2025-01-05T15:39:31Z", "pushed_at": "2024-07-02T15:16:04Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -1181,7 +1181,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-7703.json b/2024/CVE-2024-7703.json index a7f839df75..e2d767d15f 100644 --- a/2024/CVE-2024-7703.json +++ b/2024/CVE-2024-7703.json @@ -14,10 +14,10 @@ "description": "This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data.", "fork": false, "created_at": "2024-08-17T14:44:08Z", - "updated_at": "2024-08-22T02:30:08Z", + "updated_at": "2025-01-05T14:30:25Z", "pushed_at": "2024-08-17T14:51:10Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 972ce7883f..ff5a157170 100644 --- a/README.md +++ b/README.md @@ -571,6 +571,7 @@ - [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667) +- [Nxploited/CVE-2024-2667-Poc](https://github.com/Nxploited/CVE-2024-2667-Poc) ### CVE-2024-2876 (2024-05-02) @@ -970,6 +971,7 @@ - [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo) - [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis) - [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample) +- [exfil0/WEAPONIZING-CVE-2024-4367](https://github.com/exfil0/WEAPONIZING-CVE-2024-4367) ### CVE-2024-4406 (2024-05-02) @@ -29497,6 +29499,13 @@ ### CVE-2021-44910 - [W000i/CVE-2021-44910_SpringBlade](https://github.com/W000i/CVE-2021-44910_SpringBlade) +### CVE-2021-44967 (2022-02-22) + +A Remote Code Execution (RCE) vulnerabilty exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file. + + +- [D3Ext/LimeSurvey-RCE](https://github.com/D3Ext/LimeSurvey-RCE) + ### CVE-2021-45007 (2022-02-20) Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users @@ -29636,7 +29645,6 @@ - [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS) -- [plsanu/CVE-2021-45745](https://github.com/plsanu/CVE-2021-45745) ### CVE-2021-45897 (2022-01-28)